Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe
-
Size
412KB
-
MD5
e03a23ab5520ac17af1811e52e4cc981
-
SHA1
dd0898f4853cd0bf15014b76f4f82e6259ae87d9
-
SHA256
a7841c2e6ff3ecd2f6ecbbb4215e426fe39fe72282cc1d76cb1dbe4c758d2b91
-
SHA512
60f4a5a3fc8d0bf55ccc29a3d187fa2a5dc4c6fc496930cb696cdf17c1f1d08598e28c8a3056491d53b88deec74988d4a4edd688dd90e9a97e23ebfa05faa15f
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnL+wZlvuKlywhplL1jobtoDaaar5MaqwVStnP:U6PCrIc9kph5lubwXzsZoDa/A/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4684 9191.tmp -
Executes dropped EXE 1 IoCs
pid Process 4684 9191.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 208 wrote to memory of 4684 208 2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe 89 PID 208 wrote to memory of 4684 208 2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe 89 PID 208 wrote to memory of 4684 208 2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\9191.tmp"C:\Users\Admin\AppData\Local\Temp\9191.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-15_e03a23ab5520ac17af1811e52e4cc981_mafia.exe AA1198553BC33074436568AAC07D2E2127F839F662114CDD8B7514322836C4779AF77D62BA46B059CF109B1B9461C95D204B89C510155637D6044E3DFCEA6F912⤵
- Deletes itself
- Executes dropped EXE
PID:4684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5d96cdcf7e109725ce9e54f7ae4ce6a69
SHA14dc6a2995d95820ef4ff1ef9bd87cb5716c4f259
SHA256e0d6091c7a1e492b7b3c93fc4c10bae6b4e18c7195cc2ad6fbe566627f2bbe22
SHA512d3646866f5cebba15290d4af21fa238f0c45335b67f6e8326e39a70ded9c2f0310a0746e3247e1698ebb6f5f205951e7144027469a202b90858b63ce5f567ca8